#VU40761 Cryptographic issues in phpMyAdmin


Published: 2015-05-26 | Updated: 2020-08-09

Vulnerability identifier: #VU40761

Vulnerability risk: Medium

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2015-3903

CWE-ID: CWE-310

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
phpMyAdmin
Web applications / Remote management & hosting panels

Vendor: phpMyAdmin

Description

The vulnerability allows a remote non-authenticated attacker to manipulate data.

libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Mitigation
Install update from vendor's website.

Vulnerable software versions

phpMyAdmin: 4.0.0 - 4.0.10.9, 4.2.0 - 4.2.13.2, 4.3.0 - 4.3.13, 4.4.0 - 4.4.6


External links
http://cxsecurity.com/issue/WLB-2015050095
http://lists.opensuse.org/opensuse-updates/2015-07/msg00008.html
http://packetstormsecurity.com/files/131954/phpMyAdmin-4.4.6-Man-In-The-Middle.html
http://www.debian.org/security/2015/dsa-3382
http://www.phpmyadmin.net/home_page/security/PMASA-2015-3.php
http://www.securityfocus.com/archive/1/535547/100/0/threaded
http://www.securityfocus.com/bid/74660
http://www.securitytracker.com/id/1032403
http://github.com/phpmyadmin/phpmyadmin/commit/5ebc4daf131dd3bd646326267f3e765d0249bbb4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability